SlideShare a Scribd company logo
1 of 21
Download to read offline
Slide 1 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 1
Today’s Webinar
Gov’t CTO
MarkLogic
Chris Biow
Digital Media Specialist
MarkLogic
Diane Burley
Principal Technologist
MarkLogic
Fernando Mesa
Prevention & Risk Management
What you can learn from intelligence agencies
#MarkLogic
Slide 2 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 2
Challenges in Government Intel
Extreme Data — Gartner term for:
§ Multiple data sources, schemas
§ Security & privacy concerns
§ Many languages & standards – not all western
§ Rapidly changing information
§ Need for real time updates
§ Many different constituencies for information – each wanting data
presented “the right way”
§ High stakes of failure
Sound familiar?
Slide 3 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 3
Mission Accomplishment in Gov’t
§ Combine and provide information on known threat persons
§ Identify threats recorded within large feeds of sensor data
§ Intelligence analysis of enriched Open Source information
(OSINT)
§ Expose insider threat
§ Consolidate all sources of land-use information, including
unstructured
§ Enable secure sharing and discovery of sensitive information
§ Open government information to the public
§ Enable cyber defense by tracking all IT assets
Time to “Mission” / Market
Slide 4 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 4
Pressure for Real-Time
§ Radically reduced human
effort
§ Time to first capability
§ 1/3 the time
§ Weekend
§ Fast, progressive refinement
§ Ease of development
§ Ease of maintenance
§ Breadth of requirements
§ Combining sources
§ Consistent view
§ Reduced machine effort
§ Zero latency analytics
§ More data per server
§ Scalable cloud of servers
§ Alerting
Time to Mission System Response Time
Slide 5 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 5
Time can be on your side
Changing the way we deliver information.
Design Develop
Add new
data sources
Load data
Time
Traditional
approaches
Slide 6 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 6
Real-time Alert
§ Ordinary search/query
§ Save and index the documents/records
§ Run a query
§ Get the result docs/recs
§ Alerting
§ Save and index the queries with related actions
§ Event: alert
§ Criterion: annotation
§ Relationship: connection
§ Destination: routing
§ Run a new document/record
§ Get the matching queries
§ Perform their actions
The other facet of MarkLogic in Real Time
Slide 7 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 7
Why MarkLogic for Intelligence
§ Universal Repository – XML at its Core
§ Relational data
§ Hierarchical data
§ GIS
§ Text
§ Fast Access to Information – Search Engine
§ We Index Everything
§ Nothing our customers have seen runs faster
§ Can you use Google?
§ An Interface our Customers Choose
§ Our Application Interface lets you connect to your systems or
§ Use our own front end
Slide 8 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 8
Federal HC Data Concerns
§ Extremely disparate formats
§ Vast number of data domains
§ Difficult to transform, merge and manipulate
§ Time crunch
§ Many proprietary standards (and multiple
versions)
§ Difficult to manage and audit
§ Error ridden
Slide 9 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 9
Where MarkLogic Helps in Fraud
§ Data Integration Resource
§ Single Client View
§ MMIS Data & other Social Services Resources
§ GIS Integration
§ Complex Security Support (ala HIPAA)
§ Information Sharing Platform
§ Social Media friendly
§ Expose the information you want
Slide 10 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 10
Fraud in the Commercial Sector
§ Life Sciences
§ Off-label sales and marketing
§ Health Insurance
§ Social Network Analysis for Fraud Detection
Uses cases in Fraud, Waste and Misuse
Slide 11 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 11
Off-label Sales and Marketing
Characteristics
§ Integrate Extreme data
§ Rapidly changing information
§ Complex Analytics
§ Real time monitoring
§ Expose in unique ways (custom)
§ High stakes of failure
Analyzing, monitoring and reporting on internal fraud
Slide 12 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 12
Correlate different points of information
Slide 13 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 13
Correlate different points of information
Slide 14 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 14
Monitor & Alert on Suspicious Patterns
Slide 15 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 15
Monitoring off-label practices:
Business Outcome
§ Increase Compliance
§ Monitor and expose deviations in prescription patterns that may be
attributed to illegal sales or marketing activities.
§ Fewer human resources
§ The system can reveal commonalities among thousands of cases,
identifying potentially suspicious activities that the human eye
would miss.
§ Increase Revenue
§ Using the same technology the system can monitor and alert
against fraud but also can spot trends in market usage from the
correlation and analysis of company, web and social data.
Why it matters to your business
Slide 16 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 16
Healthcare Claims Fraud
§ Social Network Analysis –
§ MINE social network content from publicly available sites & health
insurance claim information.
§ CORRELATE internal & external data (both structured and
unstructured) to detect possible fraud, abuse and unnecessary
overuse.
§ Uniquely COMBINE repository, monitoring, analytics and presentation
capabilities, to identify potentially fraudulent and abusive behavior
before a claim is paid or, retrospectively, analyze providers' past
behaviors to flag suspicious patterns.
Social Network Analysis for Fraud detection
Slide 17 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 17
Social Network Analysis
Slide 18 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 18
Social Network Analysis
Slide 19 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 19
Best Practices
§ Flexible integration should be at the core
§ Complete Analysis is near impossible without the ability to ingest
easily disparate data sources: relational, hierarchical, GIS, Text.
§ Design for the unpredictable
§ Information changes fast, so do the questions that the system
needs to answer. Best to build a platform with unpredictability in
mind.
§ Harness the collective intelligence of your data and SMEs
§ Build a system that can take advantage of the shared knowledge
that is generated from your user base.
§ Speed matters
§ Real-time performance is not a nice-to-have anymore. Fast
performance allows for pro-active measures.
What we can learn from military intelligence
Slide 20 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 20
Questions?
Go’vt CTO
MarkLogic
Chris Biow
Digital Media Specialist
MarkLogic
Diane Burley
Principal Technologist
MarkLogic
Fernando Mesa
Submit questions via Q&A panel …
MarkLogic webcasts are
available online!
www.marklogic.com/webinars
Slide 21 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 21
Thank you!
For more information on this webinar:
Chris Biow – Chris.Biow@marklogic.com
Fernando.Mesa – Fernando.Mesa@marklogic.com
Diane Burley – diane.burley@marklogic.com
MarkLogic webcasts are
available online!
www.marklogic.com/webinars

More Related Content

What's hot

The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesCraig Adams
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignJohn Eckman
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 

What's hot (20)

The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By DesignGDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
GDPR FTW, or, How I Learned to Stop Worrying and Love Privacy By Design
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Bankinfonews
BankinfonewsBankinfonews
Bankinfonews
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 

Similar to Fraud webinar - Prevention & Risk Management

Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1Fernando Mesa
 
MarkLogic Semantic use cases
MarkLogic Semantic use cases MarkLogic Semantic use cases
MarkLogic Semantic use cases Fernando Mesa
 
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudInside Analysis
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in GovernmentNeo4j
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
5 keys to high availability applications
5 keys to high availability applications5 keys to high availability applications
5 keys to high availability applicationsLee Atchison
 
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019Rod Soto
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configurationmagnificbsr
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configurationmagnificsmile
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configurationbabymagnific
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configurationmagnificsmily
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configurationmagnificsairam
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentmagnifics
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentmagnificbsr
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentmagnificsairam
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentmagnificsmily
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentbabymagnific
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentmagnificsmile
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentbabymagnific
 

Similar to Fraud webinar - Prevention & Risk Management (20)

Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1Mark logic ediscovery and governance v1
Mark logic ediscovery and governance v1
 
MarkLogic Semantic use cases
MarkLogic Semantic use cases MarkLogic Semantic use cases
MarkLogic Semantic use cases
 
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
CTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINALCTAM Making Analytics Actionable RJA FINAL
CTAM Making Analytics Actionable RJA FINAL
 
5 keys to high availability applications
5 keys to high availability applications5 keys to high availability applications
5 keys to high availability applications
 
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configuration
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configuration
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configuration
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configuration
 
Oracle fusion soa operations and configuration
Oracle fusion soa  operations and configurationOracle fusion soa  operations and configuration
Oracle fusion soa operations and configuration
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 
Oracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application developmentOracle fusion 11g soa suite application development
Oracle fusion 11g soa suite application development
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Fraud webinar - Prevention & Risk Management

  • 1. Slide 1 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 1 Today’s Webinar Gov’t CTO MarkLogic Chris Biow Digital Media Specialist MarkLogic Diane Burley Principal Technologist MarkLogic Fernando Mesa Prevention & Risk Management What you can learn from intelligence agencies #MarkLogic
  • 2. Slide 2 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 2 Challenges in Government Intel Extreme Data — Gartner term for: § Multiple data sources, schemas § Security & privacy concerns § Many languages & standards – not all western § Rapidly changing information § Need for real time updates § Many different constituencies for information – each wanting data presented “the right way” § High stakes of failure Sound familiar?
  • 3. Slide 3 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 3 Mission Accomplishment in Gov’t § Combine and provide information on known threat persons § Identify threats recorded within large feeds of sensor data § Intelligence analysis of enriched Open Source information (OSINT) § Expose insider threat § Consolidate all sources of land-use information, including unstructured § Enable secure sharing and discovery of sensitive information § Open government information to the public § Enable cyber defense by tracking all IT assets Time to “Mission” / Market
  • 4. Slide 4 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 4 Pressure for Real-Time § Radically reduced human effort § Time to first capability § 1/3 the time § Weekend § Fast, progressive refinement § Ease of development § Ease of maintenance § Breadth of requirements § Combining sources § Consistent view § Reduced machine effort § Zero latency analytics § More data per server § Scalable cloud of servers § Alerting Time to Mission System Response Time
  • 5. Slide 5 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 5 Time can be on your side Changing the way we deliver information. Design Develop Add new data sources Load data Time Traditional approaches
  • 6. Slide 6 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 6 Real-time Alert § Ordinary search/query § Save and index the documents/records § Run a query § Get the result docs/recs § Alerting § Save and index the queries with related actions § Event: alert § Criterion: annotation § Relationship: connection § Destination: routing § Run a new document/record § Get the matching queries § Perform their actions The other facet of MarkLogic in Real Time
  • 7. Slide 7 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 7 Why MarkLogic for Intelligence § Universal Repository – XML at its Core § Relational data § Hierarchical data § GIS § Text § Fast Access to Information – Search Engine § We Index Everything § Nothing our customers have seen runs faster § Can you use Google? § An Interface our Customers Choose § Our Application Interface lets you connect to your systems or § Use our own front end
  • 8. Slide 8 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 8 Federal HC Data Concerns § Extremely disparate formats § Vast number of data domains § Difficult to transform, merge and manipulate § Time crunch § Many proprietary standards (and multiple versions) § Difficult to manage and audit § Error ridden
  • 9. Slide 9 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 9 Where MarkLogic Helps in Fraud § Data Integration Resource § Single Client View § MMIS Data & other Social Services Resources § GIS Integration § Complex Security Support (ala HIPAA) § Information Sharing Platform § Social Media friendly § Expose the information you want
  • 10. Slide 10 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 10 Fraud in the Commercial Sector § Life Sciences § Off-label sales and marketing § Health Insurance § Social Network Analysis for Fraud Detection Uses cases in Fraud, Waste and Misuse
  • 11. Slide 11 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 11 Off-label Sales and Marketing Characteristics § Integrate Extreme data § Rapidly changing information § Complex Analytics § Real time monitoring § Expose in unique ways (custom) § High stakes of failure Analyzing, monitoring and reporting on internal fraud
  • 12. Slide 12 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 12 Correlate different points of information
  • 13. Slide 13 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 13 Correlate different points of information
  • 14. Slide 14 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 14 Monitor & Alert on Suspicious Patterns
  • 15. Slide 15 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 15 Monitoring off-label practices: Business Outcome § Increase Compliance § Monitor and expose deviations in prescription patterns that may be attributed to illegal sales or marketing activities. § Fewer human resources § The system can reveal commonalities among thousands of cases, identifying potentially suspicious activities that the human eye would miss. § Increase Revenue § Using the same technology the system can monitor and alert against fraud but also can spot trends in market usage from the correlation and analysis of company, web and social data. Why it matters to your business
  • 16. Slide 16 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 16 Healthcare Claims Fraud § Social Network Analysis – § MINE social network content from publicly available sites & health insurance claim information. § CORRELATE internal & external data (both structured and unstructured) to detect possible fraud, abuse and unnecessary overuse. § Uniquely COMBINE repository, monitoring, analytics and presentation capabilities, to identify potentially fraudulent and abusive behavior before a claim is paid or, retrospectively, analyze providers' past behaviors to flag suspicious patterns. Social Network Analysis for Fraud detection
  • 17. Slide 17 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 17 Social Network Analysis
  • 18. Slide 18 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 18 Social Network Analysis
  • 19. Slide 19 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 19 Best Practices § Flexible integration should be at the core § Complete Analysis is near impossible without the ability to ingest easily disparate data sources: relational, hierarchical, GIS, Text. § Design for the unpredictable § Information changes fast, so do the questions that the system needs to answer. Best to build a platform with unpredictability in mind. § Harness the collective intelligence of your data and SMEs § Build a system that can take advantage of the shared knowledge that is generated from your user base. § Speed matters § Real-time performance is not a nice-to-have anymore. Fast performance allows for pro-active measures. What we can learn from military intelligence
  • 20. Slide 20 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 20 Questions? Go’vt CTO MarkLogic Chris Biow Digital Media Specialist MarkLogic Diane Burley Principal Technologist MarkLogic Fernando Mesa Submit questions via Q&A panel … MarkLogic webcasts are available online! www.marklogic.com/webinars
  • 21. Slide 21 Copyright © 2011 MarkLogic® Corporation. All rights reserved.Slide 21 Thank you! For more information on this webinar: Chris Biow – Chris.Biow@marklogic.com Fernando.Mesa – Fernando.Mesa@marklogic.com Diane Burley – diane.burley@marklogic.com MarkLogic webcasts are available online! www.marklogic.com/webinars